Triangulation fraud is an example of a devious class of scheme that prey on consumers and businesses while also serving as a reminder of the well-known phrase, “if it sounds too good to be true, it probably is.”
Unfortunately, many businesses and credit cardholders are likely to fall victim to these scams while fraudsters thrive from their ill-gotten gains. In fact, triangulation fraud and the larger category of card-not-present fraud are likely to cause a loss of up to $200 billion by 2025.
In this article, we’ll be looking at how triangulation fraud schemes work, their effects on merchants and customers, and how to avoid falling victim to these scams.
How do triangulation fraud schemes work?
Triangulation fraud schemes involve the following:
- Customers and their actual credit card (whether knowingly or unwittingly participating)
- The fraudster and their eCommerce website
- Fraudulent card details possessed by the fraudster
- Legitimate merchants and their products
The process for how the triangulation fraud scheme works is as follows:
Step 1 – An unsuspecting cardholder will find a product they wish to buy online. It will be an appealing offer, usually at a much lower price than elsewhere on the web. They will input their personal information along with their card details. These details are then sent to the fraudster.
Step 2: The fraudster will use another fraudulent card to purchase the same item from a legitimate online shop. Fraudulent card details are often purchased on the dark web or stolen from other scam victims.
Step 3: The legitimate eCommerce store will then send the order to the address of the initial customer. Days or months later, the merchant will receive a chargeback from the cardholder of the stolen card details in Step 2.
Step 4: The customer will have received their desired product; however, their personal information may now be used by fraudsters elsewhere as a Step 2 for another scam. Meanwhile, the fraudster pockets the sum charged to the legitimate customer’s card.